CHICAGO (November 17, 2009) " Trustwave, the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world, ...
08 September 2009 " Information security provider Commerce Media has further enhanced its two-factor authentication (2FA) solution with the introduction of tokens. Commerce Media's 2FA tool, Celo, was ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
TAIPEI, Taiwan--(BUSINESS WIRE)--Leading AI facial recognition provider, CyberLink Corp. (5203.TW), today announces a new collaboration with South Korean company, UNIONCOMMUNITY. In addition to the ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
When you boil it down to basics, there are three ways to authenticate someone: something they know, something they have, or something they are. "Something they know"—also known as a ...
ZURICH, Dec. 19, 2017 /PRNewswire/ -- The technology startups Sherpany and Futurae, both leaders in their fields, are collaborating with the goal of giving executive committees quicker and easier ...
Many companies rely on Microsoft products, including Windows, Active Directory, ADFS, OWA, and RDP, in their business processes. That's why the importance of two-factor authentication (2FA or MFA) for ...
As cybercrime threatens online banking security and technologists debate the efficacy of two-factor authentication solutions, business and technical questions remain. In a Network World “Face-Off” ...
Increased online fraud and new industry regulations are driving companies to search for stronger authentication methods. The problem is there’s little agreement on the best authentication method or ...
More than 80 percent of all hacking-related breaches happen due to compromised and weak credentials, with three billion username and password combinations stolen in 2016 alone. As such, the ...
My sincere thanks to WiKID, who have sponsored my writing for the past week. Check out their two-factor authentication solution – which is free for five users. Thanks guys! The WiKID Strong ...